WASHINGTON – A major Chinese telecommunications company has been boasting how it was able to hack into U.S. and international telecommunications networks and intercept what it suggested was “malicious” data. The claim was made at a conference held in Dubai in February by officials with the Chinese firm Huawei Technologies Co. Ltd., and left specialists [...]

Because technology often touches many hands in many foreign countries before reaching a contractor, malicious actors or scammers have multiple opportunities to taint materials, government officials have found. via Pentagon: Fake tech is a recurrent problem – Nextgov.

… IT systems at the Energy, Homeland Security and Justice departments more vulnerable to malicious or counterfeit software installed by other nations’ intelligence agencies or by nonstate actors and hackers… via Malicious code in the IT supply chain threatens federal operations – Nextgov.

A Call to Action on 3D IC Security John Ellis Summary Counterfeit semiconductor parts are the focus of highly-visible, new DOD and National Security initiatives and legislation, yet, little progress has been made to avert the problem of Trojan chips (embedded malicious circuits). Last summer, the Intelligence Advanced Research Projects Activity (IARPA) kicked off a [...]

Trojan Integrated Circuits Sounding the Bell on 3D IC Security John Ellis Counterfeit: made in imitation of something else with intent to deceive (Webster) Trojan Horse: someone or something intended to defeat or subvert from within usually by deceptive means (Webster) _________________________________________ e can spot a fake when we see one. Misprinted labels, stitched logos [...]

This paper was written for DARPA after participating in a winter 2008 DARPA workshop on safe and secure integrated circuit manufacturing. One of the big issues at the time was theft of intellectual property, particularly with Cray Research’s $250M DARPA award-funded project to design a next generation vector processor being fabricated in Asia. The paper [...]